@3empty - we will make sure we keep you posted. Thanks for the info. Taylor
On Tue, Feb 17, 2009 at 11:54 AM, 3mpty <[email protected]> wrote: > > Target address range is 0x22000000 to 0x2203fff (SRAM) > > The second number is 0x22003FFF or 0x2203FFF0? A digit is missing (am I > wrong?) > > Well, there's a problem if the address start with 0x2200 because, > yeah, this is the code for "... and this will stop the parsing of the > link and so the shellcode doesn't get copied into memory and won't > cause the overflow (even if I'm not sure of this). > An alternative solution could be to find some place in the memory > where there's a branch instruction to this location and place its > address in the payload of the exploit, but I don't think we'll ever > find an instruction of that kind (Jump into stack isn't common). > > Also, can someone report what was written on IRC for people like me > that weren't connected? Thank you. > > Paolo > > _______________________________________________ > Linux4nano-dev mailing list > [email protected] > https://mail.gna.org/listinfo/linux4nano-dev > http://www.linux4nano.org > _______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
